Results 271 to 280 of about 1,175,680 (325)
Some of the next articles are maybe not open access.
2017
The development of the internet and digital technologies represent a major opportunity for the UK, transforming businesses and providing new tools for everyday communication. More than 80 per cent of households in the UK now have an internet connection and internet users are spending increasing amounts of time online, undertaking a greater range of ...
openaire +1 more source
The development of the internet and digital technologies represent a major opportunity for the UK, transforming businesses and providing new tools for everyday communication. More than 80 per cent of households in the UK now have an internet connection and internet users are spending increasing amounts of time online, undertaking a greater range of ...
openaire +1 more source
2018
Abstract Cyber threats have become a pre-eminent concern in international affairs. The security of cyberspace has become a condition of the survival of modern societies; yet the scale of the threats grows only larger with time. Some states have turned to the UN system to address cyber issues. These efforts are of two general sorts.
openaire +1 more source
Abstract Cyber threats have become a pre-eminent concern in international affairs. The security of cyberspace has become a condition of the survival of modern societies; yet the scale of the threats grows only larger with time. Some states have turned to the UN system to address cyber issues. These efforts are of two general sorts.
openaire +1 more source
2016
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of
openaire +1 more source
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of
openaire +1 more source
Impact of Factors Influencing Cyber Threats on Autonomous Vehicles
Applied Artificial Intelligence, 2020Advanced Technologies are transforming the Automotive industry and the pace of innovation is accelerating at a breakneck speed. Autonomous Vehicles (AVs) incorporate many different systems and technologies and their increased computer functionality and ...
A. Seetharaman +4 more
semanticscholar +1 more source
Conference on Computer and Communications Security, 2019
Conventional attacks of insider employees and emerging APT are both major threats for the organizational information system. Existing detections mainly concentrate on users' behavior and usually analyze logs recording their operations in an information ...
Fucheng Liu +5 more
semanticscholar +1 more source
Conventional attacks of insider employees and emerging APT are both major threats for the organizational information system. Existing detections mainly concentrate on users' behavior and usually analyze logs recording their operations in an information ...
Fucheng Liu +5 more
semanticscholar +1 more source
2012 Integrated Communications, Navigation and Surveillance Conference, 2012
Presents a collection of slides from the author's conference presentation. Topics covered include: Information assurance & the risk equation; Advanced persistant threats (APTs) The threat of mobility to the US FAA.
openaire +1 more source
Presents a collection of slides from the author's conference presentation. Topics covered include: Information assurance & the risk equation; Advanced persistant threats (APTs) The threat of mobility to the US FAA.
openaire +1 more source
Cyber Security Threats, Cyber Terrorism, Cyber Warfare
The chapter delves into the multifaceted landscape of cyber threats, emphasizing the critical need for robust security measures in the face of escalating cyber terrorism and warfare. Beginning with an exploration of the evolving nature of cyber threats, the chapter elucidates the various forms of cyber-attacks that pose significant risks to individuals,Pankaj Bhambri, Alex Khang
openaire +1 more source
Potential cyber threats of adversarial attacks on autonomous driving models
Journal of Computer Virology and Hacking Techniques, 2023E. Boltachev
semanticscholar +1 more source
Cyber threat landscape in cyber space
2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), 2017As technology rises in innovation and proliferation in the present times, with everyday life melding into the digital realm, so too rise the dangers and threats that such a digital dimension presents. In an age where cyber space has become so synced with physical lives, we must learn the need for cyber security and endeavor to propagate awareness for ...
Anusha Kadambari Shanker, G. Usha
openaire +1 more source
2012
The authors concentrate on the cooperation of organisations - from government and the market sector - to address cyber threats. They discern three network action models that respectively deal with organisations' routine wrestling to fight every day's attacks on digital systems, a possible disruption of critical infrastructure and a major security ...
van Fenema, P.C., Soeters, J.M.M.L.
openaire +1 more source
The authors concentrate on the cooperation of organisations - from government and the market sector - to address cyber threats. They discern three network action models that respectively deal with organisations' routine wrestling to fight every day's attacks on digital systems, a possible disruption of critical infrastructure and a major security ...
van Fenema, P.C., Soeters, J.M.M.L.
openaire +1 more source

